Sciweavers

229 search results - page 24 / 46
» A Case for Priority
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 4 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
ICC
2007
IEEE
14 years 4 months ago
Performance Analysis of a Distributed Wireless Access Scheme
— Distributed channel access is essential for a wireless network without a central controller. In our previous research, we have proposed a distributed channel access scheme to a...
Hai Jiang, Ping Wang, Weihua Zhuang
RTSS
2007
IEEE
14 years 4 months ago
Analysis of Hierarchical EDF Pre-emptive Scheduling
This paper focuses on scheduling different hard real-time applications on a uniprocessor when the earliest deadline first algorithm is used as the local scheduler, and the global ...
Fengxiang Zhang, Alan Burns
ETFA
2006
IEEE
14 years 3 months ago
Memory-Aware Feedback Scheduling of Control Tasks
This paper presents the incorporation of an auto-tuning real-time garbage collector into a feedback-based on-line scheduling system. The studied feedback scheduler is designed to ...
Sven Gestegard Robertz, Dan Henriksson, Anton Cerv...
ICFEM
2005
Springer
14 years 3 months ago
29 New Unclarities in the Semantics of UML 2.0 State Machines
Abstract. UML 2.0, which is the standard modeling language for objectoriented systems, has only an informally given semantics. This is in particular the case for UML 2.0 state mach...
Harald Fecher, Jens Schönborn, Marcel Kyas, W...